handsomelky / Shamir-Image-Secret-SharingView external linksLinks
This repository contains an implementation of Shamir's Secret Sharing algorithm tailored for image files.
☆26Jun 4, 2024Updated last year
Alternatives and similar repositories for Shamir-Image-Secret-Sharing
Users that are interested in Shamir-Image-Secret-Sharing are comparing it to the libraries listed below
Sorting:
- godbg is a golang debugger☆11Oct 20, 2025Updated 3 months ago
- MIT dsail research project☆12May 14, 2020Updated 5 years ago
- Minimal pure-Python library that implements a basic version of a secure decentralized biometric authentication functionality via a secure…☆13Mar 27, 2024Updated last year
- Class materials, homeworks and videos for probation preparation.☆19Feb 3, 2026Updated last week
- An experimental LLVM pass plugin that allows you to apply the State of the Art function merging techniques☆16Feb 8, 2025Updated last year
- 用于cpolar内网穿透后定时获取状态通过邮件发送自己☆10Jan 22, 2024Updated 2 years ago
- minieap可在sysu使用的版本☆15Mar 13, 2021Updated 4 years ago
- ☆13Jun 25, 2024Updated last year
- 王道课后习题代码☆10Nov 11, 2022Updated 3 years ago
- Privacy-preserving k-means clustering on data owned by multiple parties☆14May 10, 2016Updated 9 years ago
- ☆12Jul 4, 2024Updated last year
- Implementation of Trust Region Policy Optimization and Proximal Policy Optimization algorithms on the objective of Robot Walk.☆12Mar 9, 2021Updated 4 years ago
- 南京大学问题求解(四)课程项目“Overcooked”☆14Aug 3, 2024Updated last year
- GZTime's GGOS for OS course project.☆47Aug 31, 2025Updated 5 months ago
- Rewrite of the original Invite-Role Bot, complete with slash commands and improved performance.☆13Jul 5, 2023Updated 2 years ago
- linux x86 and x86_64 got hook☆11Nov 14, 2019Updated 6 years ago
- This ROS package includes nodes for the online generation of end-effector's trajectories (position and orientation) using Dynamical Movem…☆10Apr 11, 2021Updated 4 years ago
- VAE for image reconstruction☆13Apr 11, 2021Updated 4 years ago
- Function Secret Sharing for Secure Thresholded Distance Metric Evaluation. The code accompanying the paper.☆13Dec 12, 2024Updated last year
- Tuning discrete PID controller using particle swarm optimization.☆15Jun 28, 2019Updated 6 years ago
- SNAP as a conda package☆13Jun 10, 2021Updated 4 years ago
- Output high level Pcode (PcodeAST) in Ghidra☆16Apr 7, 2023Updated 2 years ago
- The LLVM Project is a collection of modular and reusable compiler and toolchain technologies. Note: the repository does not accept github…☆11Aug 1, 2025Updated 6 months ago
- MATLAB数据分析与挖掘实战☆13Feb 10, 2016Updated 10 years ago
- Fuzzer targeting Android's IPC☆15Oct 2, 2015Updated 10 years ago
- Assignments of the dragon book, 2nd☆11Jan 18, 2018Updated 8 years ago
- Easy deploy pwn challenge on CTFd with plugins CTFd-Whale☆16Feb 27, 2020Updated 5 years ago
- ☆16Apr 28, 2022Updated 3 years ago
- ☆14Feb 8, 2025Updated last year
- Coursera Course --- Probabilistic Graphical Model☆14Jan 5, 2015Updated 11 years ago
- A simple compile time dfa based regular expression library for C++20.☆17Oct 12, 2025Updated 4 months ago
- A socket network library for Linux.☆13Apr 8, 2019Updated 6 years ago
- Learning Deep Parameterized Skills from Demonstration for Re-targetable Visuomotor Control☆17Apr 8, 2020Updated 5 years ago
- In this system we need to enter an image(like government document) ,it can convert image data into string☆18Feb 3, 2020Updated 6 years ago
- A voxel game written in a custom engine☆19Jan 21, 2026Updated 3 weeks ago
- ☆15May 23, 2021Updated 4 years ago
- 中山大学东校区校园网认证的客户端(非官方)☆10Dec 6, 2020Updated 5 years ago
- kvm hypervisor☆16Dec 20, 2022Updated 3 years ago
- IDA Plugin exports all pseudocode at once for easy search and analysis☆21Jan 27, 2026Updated 2 weeks ago